The Principles of Counterintelligence In Use example

Haven't found the essay you need?

We can write it for you. On time. 100% original.

Order Now
Text Preview

The Principles of Counterintelligence In Use

Whenever a threat imposes to a certain party, it is important to eliminate it in the most effective and fast way possible. In case of the threat of information or a crucial content threat, the counterintelligence method is one of the most useful as it has not only the offensive ways that eliminate the danger, but also the defensive ways that allow to prevent the future or secondary threats.

In the presented scenario, the deterrence element can be used to create risks from the offensive party that attempts to steal the contents from the storage container. In order to do this, the contents may be pronounced hazardous or illegal to carry by the unauthorized persons with the permission of law enforcement to use all required means to prevent any unauthorized access to the contents. This will make harder for the offenders to keep the contents by themselves or attempt to sell them officially, thus creating the overweight risks. Then, in order to detect and identify the threat precisely, the corresponding measures, such as screening of the storage container and interrogation of the unauthorized trespassers are to be used. This will result in developing a strategy for further threats elimination and prevention. Then, the offensive methods of counterintelligence are to be used to eliminate the current threat. This may include the change of the storage container location, which will deceive the opposition, or filling the container with other contents that are of no use to the opposition. Finally, the neutralization of the opposition in this case can be achieved by placing the opposing party member who attempt to steal the contents from storage in detention by law enforcement. This will be based on the deterrence stage, during which the contents are made illegal for the unauthorized persons, or hazardous.

The proposed solutions for the presented scenario demonstrate that the methods of counterintelligence fit greatly for eliminating the threat of theft in a non-violent way. This is useful for many aspects of human life and work as in more formal fields, such as business and management, or personal security of one’s private property.

Bibliography

"FM34-60 COUNTERINTELLIGENCE - Chapter 3 OPERATIONS AND TECHNIQUES". Federation Of American Scientists. Last modified 1995. Accessed May 25, 2017. https://fas.org/irp/doddir/army/fm34-60/f34-60_3.htm.

Prunckun, Hank. Counterintelligence Theory And Practice. 1st ed. Lanham: Rowman & Littlefield Publishers, Inc., 2012.

"STUDY MANUAL COUNTER INTELLIGENCE PROLOGUELN324". Special Forces History. Accessed May 25, 2017. http://www.sfalx.com/h_intell_manual.htm#CHAPTER 25.

U.S. Marine Corps. “Counterintelligence”, Federation of American Scientists, last modified 2000, accessed May 25, 2017, …

Download Full Essay Show full preview

Disclaimer

Examples provided by Homework Lab are intended for the motivation and research purposes only. Do not submit any paper as your own piece of work. Every essay example belongs to students, who hold the copyright for the written content. Please, mind that the samples have been submitted to the Turnitin before and may show plagiarism in case of the repeated submission. Homework Lab does not bear any responsibility for the unauthorized submission of the examples.